Infiltrating a network is not just about getting your foot in the door.

Thus the good fighter is able to secure himself against defeat. - Sun Tzu

4 - Stronghold.jpg (120.31 KiB) Viewed 2088 times

You'll also need to defend your foothold and stop the network from slamming the door in your face. Here are some defensive tips that even script kiddies should understand.

The direct method may be used for joining battle, but indirect methods will be needed in order to secure victory. - Sun Tzu

4 - Combo_Stronghold.jpg (196.62 KiB) Viewed 2088 times

While the premise of this combo seems basic, the Stronghold is the foundation of many advanced tactics, one of which we've already talked about previously here.

ICE Walls have a very fast install time, and can quickly shield a node against attacks, enabling the installation of the slower, stronger Protector, which will regenerate itself while under attack, enabling you to launch an assault without worrying about losing your ground.

A great use of this tactic is to secure nodes with lots of program slots that can be used to cause chaos! Securing a Black ICE or a Guardian in the heart of a network can cause devastation when it is properly defended.

Additionally, if you used the Flanking tactic mentioned last time to capture a weak shortcut, you can also use this combo to quickly secure a node, while setting up for a modified Sweeper combo which uses Protector instead of Shocker, or one the combos we have coming next time ...

Disclaimer: No warranty is implied or guaranteed by these statements.Don't be *that guy* - Always use protection.

There are 10 types of people in the world. Those that can read binary, and those that cant.